Show filters
48 Total Results
Displaying 11-20 of 48
Sort by:
Attacker Value
Unknown
CVE-2023-24442
Disclosure Date: January 26, 2023 (last updated October 25, 2023)
Jenkins GitHub Pull Request Coverage Status Plugin 2.2.0 and earlier stores the GitHub Personal Access Token, Sonar access token and Sonar password unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2022-4325
Disclosure Date: January 09, 2023 (last updated October 08, 2023)
The Post Status Notifier Lite WordPress plugin before 1.10.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which can be used against high privilege users such as admin.
0
Attacker Value
Unknown
CVE-2022-42906
Disclosure Date: October 13, 2022 (last updated October 08, 2023)
powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001.
0
Attacker Value
Unknown
CVE-2022-34180
Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build.
0
Attacker Value
Unknown
CVE-2022-34179
Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2022-34178
Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.
0
Attacker Value
Unknown
CVE-2020-36527
Disclosure Date: June 07, 2022 (last updated February 23, 2025)
A vulnerability, which was classified as problematic, has been found in Server Status. This issue affects some unknown processing of the component HTTP Status/SMTP Status. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2021-24846
Disclosure Date: December 21, 2021 (last updated February 23, 2025)
The get_query() function of the Ni WooCommerce Custom Order Status WordPress plugin before 1.9.7, used by the niwoocos_ajax AJAX action, available to all authenticated users, does not properly sanitise the sort parameter before using it in a SQL statement, leading to an SQL injection, exploitable by any authenticated users, such as subscriber
0
Attacker Value
Unknown
CVE-2021-24662
Disclosure Date: October 25, 2021 (last updated February 23, 2025)
The Game Server Status WordPress plugin through 1.0 does not validate or escape the server_id parameter before using it in SQL statement, leading to an Authenticated SQL Injection in an admin page
0
Attacker Value
Unknown
CVE-2021-20828
Disclosure Date: September 17, 2021 (last updated February 23, 2025)
Cross-site scripting vulnerability in Order Status Batch Change Plug-in (for EC-CUBE 3.0 series) all versions allows a remote attacker to inject an arbitrary script via unspecified vectors.
0